Abstract is missing.
- Photoshop FantasiesWalter J. Scheirer. 1 [doi]
- Steganography on Mobile AppsJennifer L. Newman. 3 [doi]
- On the Detection, Localization, and Reverse Engineering of Diverse Image ManipulationsXiaoming Liu. 5 [doi]
- TMCIH: Perceptual Robust Image Hashing with Transformer-based Multi-layer ConstraintsYaodong Fang, Yuanding Zhou, Xinran Li, Ping Kong, Chuan Qin 0001. 7-12 [doi]
- Perceptual Robust Hashing for Video Copy Detection with Unsupervised LearningGejian Zhao, Chuan Qin, Xiangyang Luo, Xinpeng Zhang 0001, Chin-Chen Chang. 13-18 [doi]
- Video Frame Interpolation via Multi-scale Expandable Deformable ConvolutionDengyong Zhang, Pu Huang, Xiangling Ding, Feng Li, Gaobo Yang. 19-28 [doi]
- Compatibility and Timing Attacks for JPEG SteganalysisEtienne Levecque, Patrick Bas, Jan Butora. 29-35 [doi]
- On Comparing Ad Hoc Detectors with Statistical Hypothesis TestsEli Dworetzky, Edgar Kaziakhmedov, Jessica J. Fridrich. 37-46 [doi]
- Progressive JPEGs in the Wild: Implications for Information Hiding and ForensicsNora Hofer, Rainer Böhme. 47-58 [doi]
- Analysis and Mitigation of the False Alarms of the Reverse JPEG Compatibility AttackJan Butora, Patrick Bas, Rémi Cogranne. 59-66 [doi]
- Advancing the JPEG Compatibility Attack: Theory, Performance, Robustness, and PracticeEli Dworetzky, Edgar Kaziakhmedov, Jessica J. Fridrich. 67-79 [doi]
- Limits of Data Driven Steganography DetectorsEdgar Kaziakhmedov, Eli Dworetzky, Jessica J. Fridrich. 81-90 [doi]
- Calibration-based Steganalysis for Neural Network SteganographyNa Zhao, Kejiang Chen, Chuan Qin 0003, Yi Yin, Weiming Zhang 0001, Nenghai Yu. 91-96 [doi]
- SCL-Stega: Exploring Advanced Objective in Linguistic Steganalysis using Contrastive LearningJuan Wen, Liting Gao, Guangying Fan, Ziwei Zhang, Jianghao Jia, Yiming Xue. 97-102 [doi]
- An Improved Reversible Database Watermarking Method based on Histogram ShiftingCheng Li, Xinhui Han, Wenfa Qi, Zongming Guo. 103-114 [doi]
- Applying a Zero-Knowledge Watermarking Protocol to Secure ElectionsScott Craver, Nicholas Rosbrook. 115-120 [doi]
- On the Feasibility of Post-Mortem Hand-Based Vascular Biometric RecognitionSimon Kirchgasser, Christof Kauba, Bernhard Prommegger, Fabio Monticelli, Andreas Uhl. 121-126 [doi]
- Differentially Private Adversarial Auto-Encoder to Protect Gender in Voice BiometricsOubaïda Chouchane, Michele Panariello, Oualid Zari, Ismet Kerenciler, Imen Chihaoui, Massimiliano Todisco, Melek Önen. 127-132 [doi]
- Hand Vein Spoof GANs: Pitfalls in the Assessment of Synthetic Presentation Attack ArtefactsAndreas Vorderleitner, Jutta Hämmerle-Uhl, Andreas Uhl. 133-138 [doi]
- First Learning Steps to Recognize Faces in the NoiseLukas Lamminger, Heinz Hofbauer, Andreas Uhl. 139-144 [doi]
- Comprehensive Dataset of Synthetic and Manipulated Overhead Imagery for Development and Evaluation of Forensic ToolsBrandon B. May, Kirill Trapeznikov, Shengbang Fang, Matthew C. Stamm. 145-150 [doi]
- MetaFake: Few-shot Face Forgery Detection with Meta LearningNanqing Xu, Weiwei Feng 0007. 151-156 [doi]
- Synthesized Speech Attribution Using The Patchout Spectrogram Attribution TransformerKratika Bhagtani, Emily R. Bartusiak, Amit Kumar Singh Yadav, Paolo Bestagini, Edward J. Delp. 157-162 [doi]
- Extracting Efficient Spectrograms From MP3 Compressed Speech Signals for Synthetic Speech DetectionZiyue Xiang, Amit Kumar Singh Yadav, Stefano Tubaro, Paolo Bestagini, Edward J. Delp. 163-168 [doi]
- Exposing Deepfakes using Dual-Channel Network with Multi-Axis Attention and Frequency AnalysisYue Zhou, Bing Fan, Pradeep K. Atrey, Feng Ding. 169-174 [doi]
- Fooling State-of-the-art Deepfake Detection with High-quality DeepfakesArian Beckmann, Anna Hilsmann, Peter Eisert. 175-180 [doi]